MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 2425c37cda002837aa1e4a512fa491ad9135974c2c50d0bc5d0be1f1e9e40391. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Threat unknown
Vendor detections: 5
| SHA256 hash: | 2425c37cda002837aa1e4a512fa491ad9135974c2c50d0bc5d0be1f1e9e40391 |
|---|---|
| SHA3-384 hash: | 130275a6f6293165e4d756056cf5a69a6dbe7e761beeab54a81ff5bd8d0cf17171946bee85031946f4a8fbac7d13f0bf |
| SHA1 hash: | 0c7fd8c2b9a774ff702dc884346e297f89988b6c |
| MD5 hash: | d1bca6b4a7922b3d8342ef2707a150c8 |
| humanhash: | lithium-blue-kansas-tango |
| File name: | doc6389372984.exe |
| Download: | download sample |
| File size: | 446'940 bytes |
| First seen: | 2020-05-14 13:12:49 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | 7c2c71dfce9a27650634dc8b1ca03bf0 (160 x Loki, 58 x Formbook, 55 x Adware.Generic) |
| ssdeep | 12288:danniiOngU1drpxC1hgOJFSHWgSXawgSV+68K3VmWm6J+:+iiOgU1drpxQhf7S2JHgqEv |
| Threatray | 451 similar samples on MalwareBazaar |
| TLSH | B79412E477648485E4A203B05A3D3623AB7F9D2C5CA8564F0BD93F523D732936A1D70B |
| Reporter |
Intelligence
File Origin
# of uploads :
1
# of downloads :
86
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Injector
Status:
Malicious
First seen:
2020-05-14 13:35:51 UTC
File Type:
PE (Exe)
Extracted files:
20
AV detection:
23 of 30 (76.67%)
Threat level:
2/5
Detection(s):
Suspicious file
Verdict:
malicious
Similar samples:
+ 441 additional samples on MalwareBazaar
Result
Malware family:
agenttesla
Score:
10/10
Tags:
family:agenttesla keylogger spyware stealer trojan
Behaviour
Loads dropped DLL
AgentTesla Payload
ServiceHost packer
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.
File information
The table below shows additional information about this malware sample such as delivery method and external references.
79f1ddd12751557a9f5ca39e669aa39676ad2091c81eb9e2ee745507be0eaf75
exe 2425c37cda002837aa1e4a512fa491ad9135974c2c50d0bc5d0be1f1e9e40391
(this sample)
Dropped by
MD5 14216d7df06d1839aaa8df81b17c6d98
Dropped by
SHA256 79f1ddd12751557a9f5ca39e669aa39676ad2091c81eb9e2ee745507be0eaf75
Delivery method
Distributed via e-mail attachment
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.